One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Lab Blog
Identifiant 8449355
Date de publication 2024-02-12 11:00:00 (vue: 2024-02-12 20:07:37)
Titre Le réseau sécurisé commence (et se termine) au point final
Secure networking starts (and ends) at the endpoint
Texte One step behind The last decade has been challenging for the cyber industry. Attackers always seem to have the upper hand while defenders play catch up. It’s common to point to the ever-accelerating frequency and sophistication of attacks, siloed security that creates gaps, and a shortage of skilled cyber professionals as rationale for this lagging position. All are true but none represent the core reason for our current situation.  The reason we are where we are is because of cloud computing. Don’t get me wrong, cloud computing has been and continues to be profoundly beneficial. It enabled digital transformation that reshaped how we do business. But it is also a huge disruptor that turned traditional, centralized computing and data networking models on their head, forcing carriers and network suppliers alike to innovate and adapt or risk obsolescence. And as networking models shifted, from centralized to distributed, so too did security, but always at a lagging pace.  With cloud computing, distributed networking, and cloud-based security becoming standard, organizations must reassess their cybersecurity approach. It is imperative that they adopt comprehensive end-to-end solutions that align with the evolving landscape of cloud computing and connectivity to address their cyber challenges.  Cloud computing’s cascading effect It’s always been about data – where data lives and how it is accessed by users. Shifts in data residency and access have triggered a series of events, beginning with: Our introduction to the cloud Server virtualization and cloud compute infrastructure, frequently referred to as infrastructure as a service (IaaS), ushered in low cost, flexible, and resource efficient computing via virtual machines (VMs) Growth in cloud computing shifted focus to new ways that enabled users, whether in offices (sites) or at home (remote users), to access the data required to perform their job duties Cloud adoption led to new networking models Networks were re-architected to align with shifting data residency, from centralized data centers to distributed cloud infrastructure This transition included moving from MPLS/datacenter designs to SD-WAN with Internet breakouts and hybrid or multi-cloud solutions  Network security transformation lagged As data networking models evolved so too did network security, but at a lagging pace Over time, the expansion of cloud-delivered security solutions helped organizations to align and optimize network security within this new cloud and networking environment But this new data and networking paradigm requires consideration beyond network security  Endpoint security has become more critical to consider in this new age of cloud computing and network connectivity where the focus is now squarely on enabling users on laptops, desktops, and mobile devices (endpoints) to access data on cloud servers and VMs (also endpoints) Endpoints bookend this continuum of users accessing data on cloud workloads, and as an essential part of the communications flow, they must be considered when designing an end-to-end security solution new secure networking Doubling down on the cloud We have come a long way from the initial cloud use case of test/dev. We’ve since moved to running production-grade applications in the cloud and are now entering the next phase of cloud application development – microservices and containerization. As the cloud becomes increasingly foundational to your organization, it is crucial to prioritize robust security for all cloud workloads. This includes ensuring top-performing endpoint security not only for VMs but a
Envoyé Oui
Condensat about accelerating access accessed accessing adapt addition address adopt adoption age agent align alike all also always application applications approach architected are assess assurance: attackers attacks aware based because become becomes becoming been beginning behind beneficial beyond bookend both breakouts business but carriers cascading case catch centers centralized challenges challenging chance chosen cloud clusters come common communications compared comprehensive compute computing computing’s confirm connectivity consider consideration considerations considered consists container containerization containers continues continuum continuum: core cost creates critical crucial current cyber cybersecurity data decade defenders delivered designing designs desktops development devices did digital disruptor distributed don’t doubling down duties effect efficient enabled enabling end endpoint endpoints ends ensuring entering environment essential evaluation events ever evolved evolving excel expansion feature flexible flow focus forcing foundational frequency frequently from future gaps get given grade growth hand has have head helped home how huge hybrid iaas imperative included includes increasingly industry infrastructure initial innovate internet introduction it’s job keep key kubernetes lack lagged lagging landscape laptops last leave led linux lives long low machines may microservices mind: mobile models modern more moved moving mpls/datacenter multi must network networking networks new next none not now obsolescence offices one only operate operating optimize organization organizations over pace paradigm parity part perform performance performing phase plan play point position prioritize procure procurement: production professionals profoundly provide rationale reason reassess referred remote represent required requires reshaped residency residing resource risk robust running secure security security  seem series server servers servers/vms/containers service shifted shifting shifts shortage significance: siloed since sites situation skilled solution solutions solutions  some sophistication squarely standard starts step suppliers systems test/dev these time too top traditional transformation transition triggered true turned upper use users ushered utilizing virtual virtualization vms wan way ways we’ve well when where whether windows with: within within this workloads workstations wrong your
Tags Mobile Cloud
Stories
Notes ★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: